Professional Documents
Culture Documents
Hernandez, Christina Marie R. Information Assurance and Security BSIT - 321
Hernandez, Christina Marie R. Information Assurance and Security BSIT - 321
02 Task Performance 1
The data that are being collected is depends on how the users shared their data
to the company. The application requires a verified phone number and email
address, as well as a detailed description of how the API will be used. Use of the
Twitter API requires agreeing to Twitter’s Developer Agreement and Policy, as
well as their related policies, and this includes the requirements on display.
These agreements are in place to ensure a reasonable usage of the Twitter API
and the data shared. Once a developer account has been established, a
developer’s Twitter application needs to be registered by providing a name,
description, and domain. This application authenticates the end user for the
application of the Twitter API and gives the user the necessary access key and
access token through the app management dashboard.
An also Twitter can collect data of users by just looking at tweets, they receive
some personal information from them like the type of device they are using and
their IP address. They can choose to share additional information with the
company like their email address, phone number, address book contacts, and a
public profile.
With the data I shared with Twitter, they can easily identify my preferences based
on the content I posted, liked, and retweeted. And for the other information I
input in their application, they can determine and suggest topics that I am
interested in, topics that I can relate in based on my age and the language that
Hernandez, Christina Marie R. Information Assurance and Security
BSIT – 321
we speak with and other signals to show us more relevant content. They can give
us transparency into that data and can modify or correct it at any time.
They can give us control through our settings to limit the data that they collect
from us and how they use it, and to control things like account security,
marketing preferences, apps that can access your account, and address book
contacts we have uploaded to Twitter. We can also download information we
have shared on Twitter.
The data is being shared on the account of the users and who they interact with
on Twitter. Twitter is public and Tweets are immediately viewable and searchable
by anyone around the world. But they can also give users a non-public way to
communicate on Twitter too. They can control this by going through protected
Tweets and Direct Messages.